Wireless technology is best described as a/an

stationary computing system.

office computing system.

mobile computing system.

inflexible computing system.

Answers

Answer 1

Answer:

mobile computing system

Explanation:

Answer 2

Answer:

mobile computing system... C


Related Questions

What is a small device that connects to a computer and acts as a modem

Answers

Answer:

Dongle

Explanation:

a small device that connects to a computer and acts as a modem. broadband. internet connection with fast data-transfer speeds and an always-on connection. cable internet service.

In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation during its current time quantum? The process will terminate itself. The process will be terminated by the operating system. The process's state will be changed from running to blocked. None of the mentioned.

Answers

Answer:

B. The process will be terminated by the operating system.

Explanation:

When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.

So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.

Based on the information given regarding CPU scheduling, the correct option is C. The process's state will be changed from running to blocked.

It should be noted that in a system where Round Robin is used for CPU scheduling, when a process cannot finish its computation during its current time quantum, the process's state will be changed from running to blocked.

It should be noted that a prices transition to a blocked state occurs when it's waiting for some events like a particular resource becoming available.

Learn more about CPU scheduling on:

https://brainly.com/question/19999569

802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels does 802.11ac support?

Answers

Answer:

The 802.11ac wireless standard takes channel bonding to a higher level because it can support 20MHz, 40MHz, and 80MHz channels, with an optional use of 160MHz channels.

Explanation:

The 802.11ac is a standardized wireless protocol established and accepted by the institute of electrical and electronics engineers (IEEE). 802.11ac as a wireless local area network (WLAN) protocol, has multiple amplitude and bandwidth, thus making it to be the first standard wireless protocol to have the ability to operate on a Gigabit (Gb) network.

Generally, the 802.11ac wireless standard provides an advantage over 802.11n by incorporating increased channel bonding capabilities. The 802.11ac wireless standard takes channel bonding to a higher level because it can support 20MHz, 40MHz, and 80MHz channels, with an optional use of 160MHz channels.

On the other hand, 802.11n is a standardized wireless protocol that can support either a 20MHz or 40MHz channel.

What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?

Answers

Answer:

4096 VLANs

Explanation:

A VLAN (virtual LAN) is a group of devices on one or more LAN connected to each other without physical connections. VLANs help reduce collisions.

An 802.1Q Ethernet frame header has VLAN ID of 12 bit VLAN field. Hence the maximum number of possible VLAN ID is 4096 (2¹²).  This means that a switch supporting the 802.1Q protocol can have a maximum of 4096 VLANs

A lot of VLANs ID are supported by a switch. The maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol is 4,094 VLANS.

All the VLAN needs an ID that is given by the VID field as stated in the IEEE 802.1Q specification. The VID field is known to be of  12 bits giving a total of 4,096 combinations.

But that of 0x000 and 0xFFF are set apart. This therefore makes or leaves it as 4,094 possible VLANS limits. Under IEEE 802.1Q, the maximum number of VLANs that is found on an Ethernet network is 4,094.

Learn more about VLANs from

https://brainly.com/question/25867685

Create an interface called Runner. The interface has an abstract method called run() that displays a message describing the meaning of run to the class. Create classes called Machine, Athlete, and PoliticalCandidate that all implement Runner.
The run() should print the following in each class:
Machine - When a machine is running, it is operating.
Athlete - An athlete might run in a race, or in a game like soccer.
PoliticalCandidate - A political candidate runs for office.
----------------------------------------------------------------------------------------------------
public class Athlete implements Runner
{
public void run()
{
// write your code here
}
}
--------------------------------------------------------------------------------------
public class DemoRunners
{
public static void main(String[] args)
{
Machine runner1 = new Machine();
Athlete runner2 = new Athlete();
PoliticalCandidate runner3 = new PoliticalCandidate();
runner1.run();
runner2.run();
runner3.run();
}
}
------------------------------------------------------------------------------------------
public class Machine implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public class PoliticalCandidate implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public interface Runner
{
// write your code here
}
----------------------------------------------------------------------------------------------------

Answers

Answer:

Please find the code and its output in the attached file.

Explanation:

In the above-given code, an interface "Runner" is defined, inside the interface, an abstract method run is declared.

In the next step, three class "Athlete, Machine, and PoliticalCandidate" s defined that implements the run method, and use the print message that holds a given value as a message.

In the next step, a class "DemoRunners" is defined, and inside the main method, the three-class object is declared, which calls the run method.

 

Find the maximum value and minimum value in milesTracker. Assign the maximum value to maxMiles, and the minimum value to minMiles. Sample output for the given program:
Min miles: -10
Max miles: 40
Here's what I have so far:
import java.util.Scanner;
public class ArraysKeyValue {
public static void main (String [] args) {
final int NUM_ROWS = 2;
final int NUM_COLS = 2;
int [][] milesTracker = new int[NUM_ROWS][NUM_COLS];
int i = 0;
int j = 0;
int maxMiles = 0; // Assign with first element in milesTracker before loop
int minMiles = 0; // Assign with first element in milesTracker before loop
milesTracker[0][0] = -10;
milesTracker[0][1] = 20;
milesTracker[1][0] = 30;
milesTracker[1][1] = 40;
//edit from here
for(i = 0; i < NUM_ROWS; ++i){
for(j = 0; j < NUM_COLS; ++j){
if(milesTracker[i][j] > maxMiles){
maxMiles = milesTracker[i][j];
}
}
}
for(i = 0; i < NUM_ROWS; ++i){
for(j = 0; j < NUM_COLS; ++j){
if(milesTracker[i][j] < minMiles){
minMiles = milesTracker[i][j];
}
}
}
//edit to here
System.out.println("Min miles: " + minMiles);
System.out.println("Max miles: " + maxMiles);
}

Answers

Answer:

See Explanation

Explanation:

Your program is correct and doesn't need an attachment.

However, there's a mismatch in placement of curly braces in your program

{

}

I've made corrections to that and I've added the corrected program as an attachment.

Aside that, there's no other thing to be corrected in your program.

Use another compiler to compile your program is you are not getting the required output.

Technician A says that the last step in the diagnostic process is to verify the problem. Technician B says that the second step is to perform a thorough visual inspection. Who is correct

Answers

Answer:

The answer to this question is given below in the explanation section. However, the correct option is Technician B.

Explanation:

There are eight steps procedures to diagnose the engine.  

Step 1 Verify the Problem

Step 2 Perform a Thorough Visual Inspection and Basic Tests

Step 3 Retrieve the Diagnostic Trouble Codes (DTCs)

Step 4 Check for Technical Service Bulletins (TSBs)

Step 5 Look Carefully at Scan Tool Data

Step 6 Narrow the Problem to a System or Cylinder

Step 7 Repair the Problem and Determine the Root Cause

Step 8 Verify the Repair and Clear Any Stored DTCs

So the correct technician is Technician B that says that the second step is to perform a thorough visual inspection.

Which feature of a database allows a user to locate a specific record using keywords?

Chart
Filter
Search
Sort

Answers

Answer:

Search

Explanation:

Because you are searching up a specific recording using keywords.

I hope this helps

Answer:

Filter

Explanation:

I got it correct for a quiz.

We define the following terms:
Lexicographical Order, also known as alphabetic or dictionary order, orders characters as follows:
For example, ball < cat, dog < dorm, Happy < happy, Zoo < ball.
A substring of a string is a contiguous block of characters in the string. For example, the substrings of abc are a, b, c, ab, bc, and abc.
Given a string, , and an integer, , complete the function so that it finds the lexicographically smallest and largest substrings of length .
Input Format
The first line contains a string denoting .
The second line contains an integer denoting .
Constraints
consists of English alphabetic letters only (i.e., [a-zA-Z]).
Output Format
Return the respective lexicographically smallest and largest substrings as a single newline-separated string.
Sample Input 0
welcometojava
3
Sample Output 0
ava
wel
Explanation 0
String has the following lexicographically-ordered substrings of length :
We then return the first (lexicographically smallest) substring and the last (lexicographically largest) substring as two newline-separated values (i.e., ava\nwel).
The stub code in the editor then prints ava as our first line of output and wel as our second line of output.
Solution:-
import java.util.Scanner;
public class Solution {
public static String getSmallestAndLargest(String s, int k) {
String smallest = "";
String largest = "";
smallest = largest = s.substring(0, k);
for (int i=1; i String substr = s.substring(i, i+k);
if (smallest.compareTo(substr) > 0)
smallest = substr;
if (largest.compareTo(substr) < 0)
largest = substr;
}
return smallest + "\n" + largest;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
String s = scan.next();
int k = scan.nextInt();
scan.close();
System.out.println(getSmallestAndLargest(s, k));
}
}

Answers

Answer:

Here is the JAVA program:

import java.util.*;  

public class Solution {    // class name

   public static String getSmallestAndLargest(String s, int k) {   //method that takes a string s and and integer k and returns lexicographically smallest and largest substrings

       String smallest = "";   //stores the smallest substring

       String largest = "";   //stores the largest substring

       smallest = largest = s.substring(0, k);  //sets the smallest and largest to substring from 0-th start index and k-th end index of string s

       for(int i = 0;i<=s.length()-k;i++){  //iterates through the string s till length()-k

            String subString = s.substring(i,i+k);  //stores the substring of string s from ith index to i+k th index

            if(i == 0){ //if i is equal to 0

                smallest = subString;              }  //assigns subString to smallest

            if(subString.compareTo(largest)>0){ //checks if the subString is lexicographically greater than largest

                largest = subString;  //sets subString to largest

            }else if(subString.compareTo(smallest)<0)  //checks if the subString is lexicographically less than smallest

                smallest = subString;       }       //sets subString to smallest

       return smallest + "\n" + largest;     }  //returns the lexicographically smallest and largest substrings

   public static void main(String[] args) {  //start of main method

       Scanner scan = new Scanner(System.in);  //creates Scanner object

       String s = scan.next();  //scans and reads input string from user

       int k = scan.nextInt();  //scans and reads integer k from user

       scan.close();  

       System.out.println(getSmallestAndLargest(s, k));      }  }  //calls method by passing string s and integer k to it to display lexicographically smallest and lexicographically largest substring

Explanation:

The program takes a string s and an integer k and passes them to function getSmallestAndLargest that returns the lexicographically smallest and lexicographically largest substring. The method works as follows:

Lets say s = helloworld and k = 3

       smallest = largest = s.substring(0, k);

s.substring(0, k);  is returns the substring from 0th index to k-th index so it gives substring hel

       for(int i = 0;i<=s.length()-k;i++) This loop iterates through the string s till s.length()-k times

s.length()-k is equal to 7 in this example

At first iteration:

i = 0

i<=s.length()-k is true  so program enters the body of loop

String subString = s.substring(i,i+k); this becomes:

subString = s.substring(0,3);

subString = "hel"

if(i == 0) this is true so:

smallest = subString;

smallest = "hel"

At second iteration:

i = 1

i<=s.length()-k is true  so program enters the body of loop

String subString = s.substring(i,i+k); this becomes:

subString = s.substring(1,4);

subString = "ell"

if(subString.compareTo(smallest)<0) this condition is true because the subString ell is compared to smallest hel and it is lexographically less than smallest so :

smallest = subString;

smallest = "ell"

So at each iteration 3 characters of string s are taken and if and else if condition checks if these characters are lexicographically equal, smaller or larger and the values of largest and smallest change accordingly

After the loop ends the statement return smallest + "\n" + largest; executes which returns the smallest and largest substrings. So the output of the entire program with given example is:

ell                                                                                                                                           wor

Here ell is the lexicographically  smallest substring and wor is lexicographically  largest substring in the string helloworld

The screenshot of the program along with its output is attached.

Which of the following tabs in the PowerPoint Ribbon is unique to PowerPoint,
not found in other Microsoft Office applications?
a.
b.
Home
Animations
Insert
View​

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct option for this question is Animation tab.

Animation tab in PowerPoint ribbon is a unique tab that is not found in other office applications such as in word, excel, outlook, publisher etc.

Because in PowerPoint you can use animation to make your slides animated and all animation can be managed and animation-related settings, you can find in the animation tab.

However, other tabs such as Home, Insert, and View are common in all office applications.

A _____ is a smaller image of a slide.

template
toolbar
thumbnail
pane

Answers

I believe it is pane since a thumbnail is like a main photo or advertising photo kind of thing and template has nothing to do with a image as well as toolbar so the answer would be pane hope that helps :)

Online Privacy
1.)Explain why is online privacy a controversial topic?
2.)Explain why this issue is applicable to you and your peers.
3.)Explain why this issue is a federal issue and not a state or local issue.

Answers

Answer:

Yes

Explanation:

Online privacy is a controversial topic due to the fact that it's a very hard thing to navigate. Some websites use cookies that are used to store your data so in a way there taking your privacy away which is controversial because of the way they use the information. Some websites store it for use of ads while others sell it. This issue is applicable to me and my peers because of the way we use technology. It can be used to steal my information about where I live and what I look up online. Also, the information stored could have my credit or debit card credentials. This issue should be a federal and nationwide issue because this is an everyday occurrence and leaves tons of people in crushing   debt every year.

def build_dictionary(string):
d = dict()
for x in string:
if not d.get(x):
d[x] = 1
else:
d[x] += 1
return d
Part 2:
Create a function named build_word_counter that has the same signature as build_dictionary. This function also returns a dictionary, however, it normalizes each word such that the case of the word is ignored (i.e. case insensitive). So the words LIKE, Like, like should be considered the same word (much like a regular dictionary would). You must use the same function add_item again (so don't make any modifications to it) Normalize words by using the lower case version of the word.
Part 3:
Create a function named build_letter_distribution that has the same signature as build_dictionary. This function returns a dictionary; however, each key will be a letter and the value will be the count that represents how many times that letter was found. Essentially you will have a letter distribution over a sentence (which is a list of words). The letters should be case insensitive.

Answers

Answer:

Follows are the code to this question:

def build_word_counter(string):#defining a method build_word_counter that accepts string as a parameter  

   d = dict()#defining d variable as a dictionary

   for x in string:#defining for loop that use string

       x = x.lower()#Use lower method  

       if not d.get(x):#defining if block that holds value in d variable

           d[x] = 1#use dictionary to hold value in 1

       else:#defining else block

           d[x] += 1#use dictionary to increment value by 1

   return d#return dictionary

print(build_word_counter(["Like","like","LIKE"]))#use print method to call method

def build_letter_distribution(string):#defining a method build_letter_distribution that accepts string variable

   d = dict()#defining d variable as a dictionary

   for i in string:#defining for loop to count string value

       for j in i:#defining for loop to hold string as number

           if not d.get(j):#defining if block that doesn't get value in dictionary  

               d[j] = 1#hold value in dictionary  

           else:#defining else block

               d[j] += 1#use dictionary to increment the dictionary value

   return d#return dictionary

print(build_letter_distribution(["Like","test","abcdEFG"]))#use print method to return its value

Output:

please find the attached file.

Explanation:

In the first program a method, "build_word_counter" is defined that accepts a string variable in its parameter, and inside the method, a dictionary variable "d" is defined that uses the for loop to hold string value and convert all value into lower case.

In the next step, a conditional statement is used that holds value in the dictionary and count its word value.

In the second program a method, "build_letter_distribution" is defined that holds string variable in its parameter, and inside the method, a dictionary variable "d" is defined that uses the two for loop and in if the block, it holds value in the dictionary and returns its value, and use print method to print its return its value.

A CPU with a quad-core microprocessor runs _____ times as fast as a computer with a single-core processor.

two

three

four

eight

Answers

Four is the rught answer i don’t think so

Answer:

four

Explanation:

quad means four so it runs four times faster

Plz answer me will mark as brainliest ​

Answers

Answer:

Application

Explanation:

Application software comes in many forms like apps, and even on computers. The software is most common on computers of all kinds while mobile applications are most common on cellular devices.

explain how to use the information in an outline to start writing a business document

Answers

Answer: document

Explanation:

maybe try to think of an impressive title that’ll catch the readers attention or reveal the purpose of your writing in ur first paragraph of the main body

Please help me. Anyone who gives ridiculous answers for points will be reported.

Answers

Answer:

Well, First of all, use Linear

Explanation:

My sis always tries to explain it to me even though I know already, I can get her to give you so much explanations XD

I have the Longest explanation possible but it won't let me say it after 20 min of writing

1. When you write HTML code, you use ______ to describe the structure of information on a webpage. a. a web address b. tags c. styles d. links

Answers

Answer:

b. tags

Explanation:

When you write HTML code, you use tags to describe the structure of information on a webpage. These tags are represented by the following symbols <>. All of HTML is written using different types of tags such as <body>, <main>, <div>, <nav>, etc. Each of these serves a different purpose but are all used for structuring the specific information on a website so that the information is well organized and is not all on top of each other. This also allows for specific sections to be easily targeted and styles separately from the other sections.

Which of the following domestic appliances does not use a magnet?
A. Fridge
B. Pressing iron
C. Radio
D. Fan​

Answers

Pressing iron isn’t domestic appliances
answer is the Pressing iron

Return to the Product Mix worksheet. Benicio wants to provide a visual way to compare the scenarios. Use the Scenario Manager as follows to create a PivotTable that compares the profit per unit in each scenario as follows:
a. Create a Scenario PivotTable report using the profit per unit sold (range B17:F17) as the result cells.
b. Remove the Filter field from the PivotTable.
c. Change the number format of the value fields to Currency with 2 decimal places and the $ symbol.

Answers

Answer:

To create a pivot table, select the columns to pivot and click on the insert option, click on the pivot table option and select the data columns for the pivot, verify the table range, select the location for the pivot and click ok. To format a column, select the columns and click the number option on the home tab, select the currency option and click on the number of decimal places

Explanation:

Microsoft Excel is a great tool for data analysis and visualization. It has several mathematical, engineering, statistical, and graphical tools for working with data.

A pivot-table is an essential tool for describing and comparing data of different types.

The steps to follow in order to produce a Pivot table would be as mentioned below:

Opting the columns for a pivot table. Now, make a click on the insert option. This click is followed by opting for the pivot table and the data columns that are available in it.After this, the verification of the range of the table is made and then, the location for the pivot table has opted. After this, the column is formatted and the number option is selected followed by the currency option, and the quantity of decimal places. A Pivot table allows one to establish a comparison between data of distinct categories(graphic, statistical, mathematical) and elaborate them.

Learn more about 'Pivot Table' here:

brainly.com/question/13298479

7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain when an adjacency list is a clear winner in the efficiency of your algorithm

Answers

Answer:

The answer is below

Explanation:

Adjacency list is a technique in a computer science that is used for representing graph. It deals with a gathering of unorganized lists utilized to illustrate a limited graph. In this method, each list depicts the group of data of a peak in the graph

Adjacency List are most preferred to Adjacency Matrix in some cases which are:

1.  When the graph to is required to be sparsely.

2.  For iterability, Adjacent List is more preferable

Which of the following is NOT solely an Internet-based company?
Netflix®
Amazon®
Pandora®
CNN®

Answers

Answer:

I think it's Pandora, though I am familiar with others

Answer:

CNN

Explanation:

The code below is supposed to display the name and score for the student with the highest score one time before the program ends. It is displaying Jim as the student with the highest score. It is displaying the highest score of 95. Unfortunately, Jim does not have a score of 95. Correct the following code:

Declare String students[SIZES] = {"Jen", "Jon", "Jan", "Joe", "Jim"}
Declare Integer scores[SIZES] = 70, 85, 72, 95, 90
Declare Integer index Declare Integer highest = scores[0]
Declare Integer highest Name = " " For index = 0
To SIZES //Assume that this translates to For (index = 0; index <= SIZES, index ++)
If scores[index] > highest then highest = scores[index]
End Of highestName = students[index]
End For Display "

The name of the student with the highest score is ", highest Name Display "The highest score is ", highest

Answers

Answer:

Modify

If scores[index] > highest then highest = scores[index]

End Of highest

Name = students[index]

End For Display

to

If scores[index] > highest then highest = scores[index]

Name = students[index]

End Of highest

End For Display

Explanation:

In the code, you posted the code segment that gets the name of the student with the highest score is outside the if condition that determines the highest.

To make correction, we only need to bring this code segment into the loop.

See Answer

If the propagation delay through a full-adder (FA) is 150 nsec, what is the total propagation delay in nsec of an 8-bit ripple-carry adder

Answers

Answer:

270 nsec

Explanation:

Ripple-carry adder is a combination of multiple full-adders. It is relatively slow as each full-adder waits for the output of a previous full-adder for its input.

Formula to calculate the delay of a ripple-carry adder is;

  = 2( n + 1 ) x D

delay in a full-adder = 150 nsec.

number of full-adders = number of ripple-carry bits = 8

 = 2 ( 8 + 1 ) x 150

 = 18 x 150

 = 270 nsec

My Mac is stuck on this screen? How to fix?

Answers

Answer:

Press and hold the power button for up to 10 seconds, until your Mac turns off. If that doesn't work, try using a cellular device to contact Apple Support.

Explanation:

If that also doesn't work try click the following keys altogether:

(press Command-Control-Eject on your keyboard)

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

This makes the laptop (macOS) instruct to restart immediately.

Hopefully this helps! If you need any additional help, feel free and don't hesitate to comment here or private message me!. Have a nice day/night! :))))

Another Tip:

(Press the shift, control, and option keys at the same time. While you are pressing those keys, also hold the power button along with that.)

(For at least 10 seconds)

Which type of chart or graph uses vertical bars to compare data?

Column chart
Line graph
Pie chart
Scatter chart

Answers

Answer:

Colunm Chart

Explanation:

Trust me

Explaim Why the shape of a cell is hexagonal

Answers

because the hexagon creates a perfect shape to cover an entire area without any overlapping, and can cover an entire area without any gaps.

Which function is used to display a string value to the screen?
main[]
print()
run=
SHOW!

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

in most programming languages, the print() function is used to display a string value to the screen. Because, the print function prints all the string given in it as a parameter.

for example: to print hello world.

we use the function to print hello world as print("hello world").

However, it noted that other options are not correct because the main() function is an entry point of a program and it does not print string value to the screen. while run and show function do not print string value of screen also.

Answer:

in python print()

Plz answer me will mark as brainliest ​

Answers

Answer:

True

Operating System

Booting

B1:B4 is a search table or a lookup value

Answers

Answer:

lookup value

Explanation:

Other Questions
Which type of energy change causes this leaf to grow? A. Thermal energy is transformed into potential energy. B. Thermal energy is transferred to the leaf. C. Electromagnetic energy is transformed into chemical energy. D. Electromagnetic energy is transferred to the leaf. According to Daltons atomic theory, what are elements and what makes one element different from another? Which of the following versions of the underlined text best accomplishes this goal?In September 2018, an amazing spectacle took place in the skies above Olympic National Park: blindfolded, sedated mountain goats hovered in the air, suspended in harnesses from a helicopter.A) (as it is now)B) officials from the National Park Service enacted a plan to relocate goatsC) steps were taken to ensure the safety of visitors to Olympic National ParkD) there was a small but noteworthy addition to the animal population of North Cascades National ParkE) the first phase of the Mountain Goat Management Plan began Leon was asked to repaint the sign for his mother's ice cream shop, so he needs to figure out how much paint he will need. Determine the area of the ice cream cone on the sign. Round to the nearest tenth. 6 in 12 in. At every depth, soil composition remains the same.OTrueO False 5. Paul is x years old.Rebecca is four times older than Paul.Gemma is 10 years older than Paul.the sum of their ages is 82 Years.(a) Form a simplified equation in terms of x(b) Solve the equation and work out each persons age. for a giveaway, a local radio station is putting together goodie bags. The bags will include tickets and posters. Each goodie bag will receive an equal share of 54 tickets and 36 posters.(A) what is the greatest number of goodie bags that can be created? explain your reasoning. (B) How many of each type of giveaway will be in each bag? Explain your reasoning. Read the excerpt from "I'm Not Thirteen Yet" by Amy Bernstein. Right away, Margaret was kneeling next to me. "Are you okay? Are you okay?" she asked. "Richard, you menie, what were you thinking? This is my best friend, and if you want to mess with someone, don't pick her. Ohand you stink at soccer!" At this point, I was lying on my back, and my head shot up when I heard the words "best friend." I squinted and saw Margaret standing above me. She extended her hand. She was ready to help me up. She grinned. From then on, I knew who my best friend was. She didn't care what age I was, and never would. To this day, we both have the framed picture of us at the bus stop that first day of camp. What significant event is described in this excerpt? Richard knocks Jamie over during a game of soccer. Jamie learns that Margaret is her best friend. Margaret kneels down next to Jamie. Jamie squints and sees Margaret standing above her. Pls Help Me if tan =3 determine all the possible values of such that -202 What is the antecedent of the pronoun in the following sentence? . The Atlantic salmon lives most of its life in the ocean. The Atlantic salmon Lives Life Ocean Which Is The Correct Classification And Decimal Expansion of 3/8 If your hypothesis is incorrect you should... 2(8+9)=qsdffffffffffffffffffffffffff How did early humans create their art? RQT is a straight angle. What are mRQS and mTQS?Somone help please please find the answer, i need this asap! Can someone please help me with this spanish! Lmk if you have any questions. Thank you sooo much! What is the degree of the following polynomial? how do i say hello my name is in german Simplify: 3x-4(2x-6) + 9